Remove CISO Remove Media Remove Risk Remove Social Engineering
article thumbnail

Social Media Regulation: The Line Between Privacy and Protection

Security Boulevard

The debate over how much responsibility social media companies should have when it comes to regulating or policing what users post continues, particularly in the past year or so. The post Social Media Regulation: The Line Between Privacy and Protection appeared first on Security Boulevard.

Media 105
article thumbnail

Australia Recorded the Highest Rate of iOS & Android App Threats

Appknox

More threats were detected on iOS than Android devices; 68% of Australian CISOs expect their organization to suffer a material cyber-attack within the next year. The risks to the privacy of Australian customers are at an all-time high, as the nation has reported the highest percentage of mobile threats globally, standing at 26.9%.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

‘The people’ of cybersecurity are its greatest strength and weakness

SC Magazine

Senior security and IT leaders point to employees and their companies’ own supply chains as the source of constant risk of malicious and unintentional vulnerabilities, exacerbated by remote work and cloud-based environments. . Respondents said blurring the boundaries between work and personal computing exacerbates the problems.

article thumbnail

GUEST ESSAY: Addressing DNS, domain names and Certificates to improve security postures

The Last Watchdog

Although, the topic has gained popularity amongst CIOs and CISOs, most companies are still overlooking important security blind spots when it comes to securing their digital assets outside the enterprise firewalls—domains, DNS, digital certificates. I like to think of this topic like the electricity that powers our homes.

DNS 182
article thumbnail

The Unseen Threats: Anticipating Cybersecurity Risks in 2024

Security Boulevard

Cybersecurity risks increase every year and bludgeon victims who fail to prepare properly. For those interested in a better understanding of the oncoming risks, this is the information you are looking for. It can feel like crossing a major highway while blindfolded. Many never see the catastrophe about to happen, until it occurs.

Risk 115
article thumbnail

LinkedIn Hack is Scraped Data, Company Claims

eSecurity Planet

Further reading : How to Control API Security Risks. Qualys CISO Ben Carr told eSecurity Planet that all platforms should be constantly reviewing and logging where their data resides and how it’s accessed. ” A Wake-Up Call for Social Media Users. ” A Wake-Up Call for Social Media Users.

Hacking 113
article thumbnail

Phish or Be Phished. That is the question!

Security Boulevard

Even with some excellent advanced threat protection, do not risk exposure to your device. Phishing attacks often rely on social engineering techniques to trick users into revealing sensitive data. Social media sites like LinkedIn, Facebook, and Google+ are commonly exploited to access user accounts.